0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Microsoft Azure Security Technologies Certification and Beyond - Gain practical skills to secure your Azure environment and... Microsoft Azure Security Technologies Certification and Beyond - Gain practical skills to secure your Azure environment and pass the AZ-500 exam (Paperback)
David Okeyode
R1,388 Discovery Miles 13 880 Ships in 10 - 15 working days

Excel at AZ-500 and implement multi-layered security controls to protect against rapidly evolving threats to Azure environments - now with the the latest updates to the certification Key Features Master AZ-500 exam objectives and learn real-world Azure security strategies Develop practical skills to protect your organization from constantly evolving security threats Effectively manage security governance, policies, and operations in Azure Book DescriptionExam preparation for the AZ-500 means you'll need to master all aspects of the Azure cloud platform and know how to implement them. With the help of this book, you'll gain both the knowledge and the practical skills to significantly reduce the attack surface of your Azure workloads and protect your organization from constantly evolving threats to public cloud environments like Azure. While exam preparation is one of its focuses, this book isn't just a comprehensive security guide for those looking to take the Azure Security Engineer certification exam, but also a valuable resource for those interested in securing their Azure infrastructure and keeping up with the latest updates. Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide builds a solid foundation of Azure security. You'll not only learn about security technologies in Azure but also be able to configure and manage them. Moreover, you'll develop a clear understanding of how to identify different attack vectors and mitigate risks. By the end of this book, you'll be well-versed with implementing multi-layered security to protect identities, networks, hosts, containers, databases, and storage in Azure - and more than ready to tackle the AZ-500. What you will learn Manage users, groups, service principals, and roles effectively in Azure AD Explore Azure AD identity security and governance capabilities Understand how platform perimeter protection secures Azure workloads Implement network security best practices for IaaS and PaaS Discover various options to protect against DDoS attacks Secure hosts and containers against evolving security threats Configure platform governance with cloud-native tools Monitor security operations with Azure Security Center and Azure Sentinel Who this book is forThis book is a comprehensive resource aimed at those preparing for the Azure Security Engineer (AZ-500) certification exam, as well as security professionals who want to keep up to date with the latest updates. Whether you're a newly qualified or experienced security professional, cloud administrator, architect, or developer who wants to understand how to secure your Azure environment and workloads, this book is for you. Beginners without foundational knowledge of the Azure cloud platform might progress more slowly, but those who know the basics will have no trouble following along.

Penetration Testing Azure for Ethical Hackers - Develop practical skills to perform pentesting and risk assessment of Microsoft... Penetration Testing Azure for Ethical Hackers - Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments (Paperback, Ed)
David Okeyode, Karl Fosaaen, Charles Horton
R1,328 Discovery Miles 13 280 Ships in 10 - 15 working days

Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breaches Key Features Understand the different Azure attack techniques and methodologies used by hackers Find out how you can ensure end-to-end cybersecurity in the Azure ecosystem Discover various tools and techniques to perform successful penetration tests on your Azure infrastructure Book Description"If you're looking for this book, you need it." - 5* Amazon Review Curious about how safe Azure really is? Put your knowledge to work with this practical guide to penetration testing. This book offers a no-faff, hands-on approach to exploring Azure penetration testing methodologies, which will get up and running in no time with the help of real-world examples, scripts, and ready-to-use source code. As you learn about the Microsoft Azure platform and understand how hackers can attack resources hosted in the Azure cloud, you'll find out how to protect your environment by identifying vulnerabilities, along with extending your pentesting tools and capabilities. First, you'll be taken through the prerequisites for pentesting Azure and shown how to set up a pentesting lab. You'll then simulate attacks on Azure assets such as web applications and virtual machines from anonymous and authenticated perspectives. In the later chapters, you'll learn about the opportunities for privilege escalation in Azure tenants and ways in which an attacker can create persistent access to an environment. By the end of this book, you'll be able to leverage your ethical hacking skills to identify and implement different tools and techniques to perform successful penetration tests on your own Azure infrastructure. What you will learn Identify how administrators misconfigure Azure services, leaving them open to exploitation Understand how to detect cloud infrastructure, service, and application misconfigurations Explore processes and techniques for exploiting common Azure security issues Use on-premises networks to pivot and escalate access within Azure Diagnose gaps and weaknesses in Azure security implementations Understand how attackers can escalate privileges in Azure AD Who this book is forThis book is for new and experienced infosec enthusiasts who want to learn how to simulate real-world Azure attacks using tactics, techniques, and procedures (TTPs) that adversaries use in cloud breaches. Any technology professional working with the Azure platform (including Azure administrators, developers, and DevOps engineers) interested in learning how attackers exploit vulnerabilities in Azure hosted infrastructure, applications, and services will find this book useful.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Shadows In Death
J. D. Robb Paperback R360 Discovery Miles 3 600
Still Standing
Stephen Leather Paperback R388 Discovery Miles 3 880
Een Of Ander Held
Zirk van den Berg Paperback R350 R301 Discovery Miles 3 010
The Spy Coast
Tess Gerritsen Paperback R380 R297 Discovery Miles 2 970
1979
Val McDermid Paperback R484 R400 Discovery Miles 4 000
Camino Ghosts
John Grisham Paperback R450 R299 Discovery Miles 2 990
Doolhof
Rudie van Rensburg Paperback R365 R314 Discovery Miles 3 140
Amok
Sebastian Fitzek Paperback R482 R397 Discovery Miles 3 970
The House In The Pines
Ana Reyes Paperback R476 R390 Discovery Miles 3 900
Confessions Of The Dead
James Patterson, J. D. Barker Paperback R245 R179 Discovery Miles 1 790

 

Partners